GCP Authentication Support
· One min read
Atmos now supports first-class Google Cloud authentication alongside AWS and Azure, with provider-scoped file isolation and a unified auth experience.
What Changed
- Added GCP providers:
gcp/adcandgcp/workload-identity-federation. - Added GCP identities:
gcp/service-accountandgcp/project. - Implemented provider-scoped file isolation at
~/.config/atmos/gcp/<provider-name>/.... - Integrated GCP auth with
atmos auth login,atmos auth whoami, and Terraform execution.
Why This Matters
- Use the same auth flow across AWS, Azure, and GCP.
- Avoid long-lived keys in CI/CD with Workload Identity Federation.
- Keep credentials isolated per provider and identity, without touching user
gcloudconfig.
How to Use It
Example configuration:
auth:
providers:
gcp-adc:
kind: gcp/adc
project_id: my-project
gcp-wif:
kind: gcp/workload-identity-federation
project_number: "123456789012"
workload_identity_pool_id: github-pool
workload_identity_provider_id: github-provider
token_source:
type: url
identities:
terraform:
kind: gcp/service-account
default: true
via:
provider: gcp-adc
principal:
service_account_email: terraform@my-project.iam.gserviceaccount.com
Authenticate and verify:
atmos auth login --identity terraform
atmos auth whoami
Get Involved
Feedback and testing reports are welcome. If you use GCP in CI/CD, try the WIF provider and share any edge cases you encounter.
